The iBanking is a banking Trojan that disguises itself as a security application for Android devices. The Trojan is distributed through attacks HTML injection.
Recently, Trojan's source code has leaked online through an underground forum, which has allowed too many cybercriminals to launch attacks using this malware.
A malicious iBanking application when installed on a victim's phone may spy on the user's communications. The bot allows an attacker to send fake SMS, redirect calls to any predetermined phone number, record sounds using the device's microphone, and steal other sensitive data such as call history and phonebook contacts.
According to a new report by its security researchers ESET, iBanking Trojan (Android / Spy.Agent.AF) is targeting Facebook users to trick them into downloading malware.
The next fake page asks the victim to download an Android application from a QR code or using an SMS if for some reason he can not download it. Once downloaded and installed, the malware connects to the administration and control server which allows attackers to give it commands to execute on any infected device.
Since many banking sites use two-factor authentication and transaction licensing systems to avoid various threats, criminals began to develop malware such as iBanking to bypass two-factor authentication.
The iBanking Trojan can be used in conjunction with any malware to do injection malicious code on a web page and is generally used to redirect the incoming SMS messages of the infected device.
It is always important to download third-party applications only from trusted sources. You can do this simply by setting the menu / Applications / and turning off "unknown sources".